
CISSP Final
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Brian OHare
Used 1+ times
FREE Resource
Student preview

50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Physical assets defined in an organization's business impact analysis (BIA) could include which of the following?
Personal belongings of organizational staff members
Disaster recovery (DR) line-item revenues
Cloud-based applications
Supplies kept off-site a remote facility
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When assessing the audit capability of an application, which of the following activities is MOST important?
Identify procedures to investigate suspicious activity.
Determine if audit records contain sufficient information.
Verify if sufficient storage is allocated for audit records.
Review security plan for actions to be taken in the event of audit failure.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization would like to implement an authorization mechanism that would simplify the assignment of various system access permissions for many users with similar job responsibilities. Which type of authorization mechanism would be the BEST choice for the organization to implement?
Role-based access control (RBAC)
Discretionary access control (DAC)
Mandatory access control (MAC)
Attribute-based access control (ABAC)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of access control is abbreviated as RBAC?
Role-based access control
Discretionary access control
Content-dependent Access Control
Rule-based Access Control
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the PRIMARY reason for criminal law being difficult to enforce when dealing with cybercrime?
Jurisdiction is hard to define.
Law enforcement agencies are understaffed.
Extradition treaties are rarely enforced.
Numerous language barriers exist.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Wi-Fi Protected Access 2 (WPA2) provides users with a higher level of assurance that their data will remain protected by using which protocol?
Extensible Authentication Protocol (EAP)
Internet Protocol Security (IPsec)
Secure Sockets Layer (SSL)
Secure Shell (SSH)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?
Reference monitor
Trusted Computing Base (TCB)
Time separation
Security kernel
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development